Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["EX2300, EX2300-C, EX3400"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"status": "affected", "version": "18.1R3-S4"}, {"status": "affected", "version": "18.3R1-S3"}]}], "datePublic": "2019-10-09T00:00:00", "descriptions": [{"lang": "en", "value": "Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol \"__aeabi_uidiv\" /sbin/veriexec: Undefined symbol \"__aeabi_uidiv\" /sbin/veriexec: Undefined symbol \"__aeabi_uidiv\" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2019-10-09T19:26:18", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://kb.juniper.net/JSA10978"}, {"tags": ["x_refsource_MISC"], "url": "https://www.juniper.net/documentation/en_US/junos/topics/concept/veriexec.html"}], "solutions": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos OS: 18.1R3-S5, 18.3R1-S4, and all subsequent releases."}], "source": {"advisory": "JSA10978", "discovery": "INTERNAL"}, "title": "Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS", "workarounds": [{"lang": "en", "value": "To reduce the risk of exploitation of this vulnerability, customers should limit access to the Junos shell to only trusted administrators. However, Juniper Networks strongly recommends upgrading to an updated release of Junos OS to resolve this issue."}], "x_generator": {"engine": "Vulnogram 0.0.8"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0071", "STATE": "PUBLIC", "TITLE": "Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Junos OS", "version": {"version_data": [{"platform": "EX2300, EX2300-C, EX3400", "version_affected": "=", "version_name": "18.1R3-S4", "version_value": "18.1R3-S4"}, {"platform": "EX2300, EX2300-C, EX3400", "version_affected": "=", "version_name": "18.3R1-S3", "version_value": "18.3R1-S3"}]}}]}, "vendor_name": "Juniper Networks"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol \"__aeabi_uidiv\" /sbin/veriexec: Undefined symbol \"__aeabi_uidiv\" /sbin/veriexec: Undefined symbol \"__aeabi_uidiv\" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400."}]}, "generator": {"engine": "Vulnogram 0.0.8"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-347 Improper Verification of Cryptographic Signature"}]}]}, "references": {"reference_data": [{"name": "https://kb.juniper.net/JSA10978", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10978"}, {"name": "https://www.juniper.net/documentation/en_US/junos/topics/concept/veriexec.html", "refsource": "MISC", "url": "https://www.juniper.net/documentation/en_US/junos/topics/concept/veriexec.html"}]}, "solution": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos OS: 18.1R3-S5, 18.3R1-S4, and all subsequent releases."}], "source": {"advisory": "JSA10978", "discovery": "INTERNAL"}, "work_around": [{"lang": "en", "value": "To reduce the risk of exploitation of this vulnerability, customers should limit access to the Junos shell to only trusted administrators. However, Juniper Networks strongly recommends upgrading to an updated release of Junos OS to resolve this issue."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T17:37:07.688Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://kb.juniper.net/JSA10978"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.juniper.net/documentation/en_US/junos/topics/concept/veriexec.html"}]}]}, "cveMetadata": {"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0071", "datePublished": "2019-10-09T19:26:18.033236Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T17:58:37.253Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}